通信技術(shù)專業(yè)英語.ppt_第1頁
通信技術(shù)專業(yè)英語.ppt_第2頁
通信技術(shù)專業(yè)英語.ppt_第3頁
通信技術(shù)專業(yè)英語.ppt_第4頁
通信技術(shù)專業(yè)英語.ppt_第5頁
已閱讀5頁,還剩38頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、Technical English,For Information and Communication Engineering 2020/8/6,Unit Five,National Security in the Information Age,2,概述,知識經(jīng)濟和信息時代 信息時代的特征 Toffler的第三次浪潮理論 信息時代國家安全概念的變化和面臨的問題,3,4,5,會改變而且確實變了,后工業(yè)化社會中國家安全概念的改變,Conceptions of national security can and do change. A series of new threats to the n

2、ational security have developed with the transition into the Information Age. New technological developments and an increased reliance on computer-based technology will cause a shift in conceptions of national security for the post-industrial societies.,Unit 5,6,信息基礎(chǔ)設(shè)施遭到新型攻擊技術(shù)的破壞、修改,或陷入癱瘓的危險,在崩潰和災難來

3、臨之前大系統(tǒng)的易受攻擊性幾乎不被人們注意,Nations face the danger of having their information infrastructures destroyed, altered, or incapacitated by new offensive technologies. Accordingly, grand strategies must integrate these new threats and vulnerabilities into their general framework. Although Eugene Skolnikoff arg

4、ues that the vulnerability of large systems is rarely noticed until disruption or catastrophe occurs, these issues must be dealt with to minimize their economic and political costs.,Unit 5,7,它將如何影響國家和國際政治關(guān)系,新技術(shù)帶來的威脅,說明這些技術(shù)以往是如何被利用來威脅社會安全的,Scientists and political leaders must recognize and examine t

5、he threats posed by new technology and how it will affect both national and international political relationships. Here we provide an introduction to these new technologies and suggests ways they have been utilized in the past to threaten security of the society.,Unit 5,8,最后以提出若干政策建議作為結(jié)論,在過渡到新的國家安全計

6、劃的時期對政策制訂者提供協(xié)助,它是如何與以往改變基本面貌的重大技術(shù)相聯(lián)系的,是如何在傳統(tǒng)的現(xiàn)實主義或自由主義國家安全學派內(nèi)部進行分析和討論的,Unit 5,其吸引力和威懾力是什么,The threat is also placed in a theoretical political context by examining how it relates to paradigm-shifting technologies of the past, what its attractions and deterrents are, and how it would be analyzed and

7、addressed within traditional realist/liberal national security schools.1 It concludes with policy prescriptions to assist policy makers in the transition to a new national security agenda.,9,Unit 5,政策制定者和分析人士現(xiàn)在剛剛開始了解政府和政治生活最終會受到信息革命怎樣的影響,The need for work in this area is great. Very little work has

8、been done to examine security issues related to information technology. David Ronfeldt argues that “with few exceptions, policy makers and analysts are just beginning to discern how government and politics may ultimately be affected by the information revolution.”,10,將它們組織在一起,揭示國家安全隱患并指出對此我們可以做些什么,A

9、s a result, we will draw from a wide range of material that has been taken from multiple disciplines and weaves it all to reveal national security vulnerabilities and what can be done about them.2,Unit 5,從來自多學科的廣泛材料中吸取素材,11,社會發(fā)展的模式遵循一系列的浪潮,每一次都比前一次的時間跨度更小,The world is making a transition to a new ag

10、e. Alvin Toffler referred to this transition as the Third Wave, in his 1980 book of the same title. According to Toffler, the pattern of societal development follows a series of waves, each of a lesser time span than the previous.,Unit 5,12,其中每一次都將以往的文化或文明沖刷干凈,代之以過去難以想象的生活方式,第三次浪潮將在幾十年時間里席卷歷史,完成它的進程

11、,Toffler writes: Until now the human race has undergone two great waves of change, each one largely obliterating earlier cultures or civilizations and replacing them with ways of life inconceivable to those who came before.3 The First Wave of change the agricultural revolution took thousands of year

12、s to play itself out. The Second Wave the rise of industrial civilization took a mere three hundred years. Today, history is even more accelerative, and it is likely that the Third Wave will sweep across history and complete itself in a few decades.,Unit 5,13,他所預言的社會革命如今已經(jīng)得到認同,被稱為信息革命,Tofflers predi

13、ctions about the coming Third Wave were written over fifteen years ago, and the societal revolution he predicted is readily acknowledged today as the Information Revolution.,Unit 5,14,以工業(yè)為基礎(chǔ)的職業(yè)的衰落看上去與當初由第一次到第二次浪潮轉(zhuǎn)換期間農(nóng)業(yè)職業(yè)的衰落很相像,This terminology is used by many political leaders to describe the transi

14、tion to a knowledge based economy. Various scholars argue that some developed countries have already made the transition into the Information Age and a majority of our jobs are already knowledge-based. In fact the decline in industrial based jobs looks similar to the decline in agricultural jobs bro

15、ught about by the transition from the First to the Second Wave. The swell of the Third Wave is already visible and its crest no longer unimaginable.,Unit 5,15,從這一次閱讀中,If this Sunday, anyone were to sit down and read the entire New York Times, he/she would absorb more information in that one reading

16、than the average person absorbed in a lifetime in Thomas Jeffersons Day.,Unit 5,16,使普通人能擁有像圣經(jīng)那樣以往難得一見的文字材料,這減少了對文字解釋的等級制權(quán)威的依賴,Information revolutions are not new. Gutenbergs printing press launched an information revolution over five hundred years ago. His invention allowed for the mass distribution

17、 of information, permitting common men to possess otherwise scarce texts like the Bible.4 This created less reliance on hierarchical sources of authority for interpretation of texts and granted anyone with the resources to operate a printing press access to large audiences.5,Unit 5,17,提供了一種可能的空間,使人們

18、的思想和身體得以轉(zhuǎn)換功能從而使過去用體力進行的工作今后變成通過文化(智力)的方式來實現(xiàn),To take the argument even further, author Kevin Kelly argues that cultural advances, like the printing press “prepared a possibility space that allowed human minds and bodies to shift so that some of what it once did biologically would afterwards be done c

19、ulturally.”6 Under this view, the printing press served a dual purpose.,Unit 5,18,減少大腦需要記憶的信息量,It revolutionized the way human beings interact and it contributed to our evolution by decreasing the amount of information our minds needed to store. In this regard, the Information Revolution is similar

20、to the printing revolution. Computers increase our capacity to store and search for information externally.,Unit 5,19,人們只要想一想 所帶來的變化就能了解 ,Other mediums of communication might be considered revolutionary as well. One need only think of the changes brought about by the invention of the telephone, radi

21、o, and television to realize that information revolutions have their place in history. Each of these technologies increased our capacity to communicate over great distances.,Unit 5,20,這一信息革命是如何先前不同的呢?,In some cases, the communication took place over physical cables, and in other cases the communicat

22、ion took place over frequency waves with no physical connection required. How does this information revolution promise to be different?,Unit 5,21,在極短的時間里訪問、分發(fā)以及存儲大得不可思議的信息量的能力,在任何有標準電話線或蜂窩式電話覆蓋的地方,Unit 5,The difference is our increased ability to access, distribute and store incredibly large quantit

23、ies of information in very little time. It is now possible to send the entire Encyclopedia Britanica across the country in about two seconds. Access to large quantities of information through electronic communications is a realizable goal anywhere there is access to a standard phone line or cellular

24、 cell.,22,萬維網(wǎng)(WWW)則經(jīng)歷著每年314,634%的增長率,以每月25%的速率增長,In the near future, a series of low orbit satellites will allow electronic communications technology to be utilized from any location on earth. In addition to this, the Internet, currently the worlds information backbone, is increasing at a rate of tw

25、enty-five percent per month and the World Wide Web has been experiencing growth rates of 341,634 percent per year.,Unit 5,23,勞動力在一個屬于第三次浪潮的國家里變成了知識型的,With this increase in interconnectivity and information resources, the labor force of a Third Wave nation becomes knowledge-based. Peter Drucker write

26、s:,Unit 5,24,財富創(chuàng)造的核心將既不是用于生產(chǎn)的資本配置,也不是勞動力,十九世紀和二十世紀經(jīng)濟理論中無論是經(jīng)典派,馬克思主義,凱恩斯學派,還是新經(jīng)典主義的兩個基本要素,The basic economic resource “the means of production,” to use the economists term is no longer capital, nor natural resources, nor labor. It is and will be knowledge. The central wealth making activities will be

27、 neither the allocation of capital to productive uses, nor labor the two poles of nineteenth and twentieth century economic theory, whether classical, Marxist, Keynesian, or neo-classical.7,Unit 5,25,價值是由勞動生產(chǎn)率和創(chuàng)新所創(chuàng)造的,這兩者都是知識在工作中的應用,知識社會的領(lǐng)導集團將是知識的生產(chǎn)者和知識的管理者,他們知道如何配置知識得到高的產(chǎn)出,Value is now created by pr

28、oductivity and innovation, both applications of knowledge to work. The leading social groups of the knowledge society will be knowledge workers and knowledge executives who know how to allocate knowledge to productive use, just as the capitalists knew how to allocate capital to productive use. Yet,

29、unlike the employees under Capitalism, they will own both the means of production and the tools of production.,Unit 5,26,表達過類似的意見,后工業(yè)時代的關(guān)鍵點在于知識和信息成為社會中戰(zhàn)略和改造的源泉,Other scholars have expressed similar sentiments. Daniel Bell echoes Druckers argument when he proposes that “the crucial point about a post

30、-industrial society is that knowledge and information become the strategic and transforming resources of the society, just as capital and labor have been the strategic and transforming resources of the industrial society.”,Unit 5,27,Unit 5,資金或者是資金的物理代表形式,The key financial institutions of knowledge-b

31、ased societies also become information-based. Today, a majority of the financial transactions in many countries do not involve the physical transfer of capital or physical representations of money such as gold or currency, but rather the transfer of information. For example, when money is loaned bet

32、ween institutions no physical transfer of funds takes place. Instead, the informational representation of money is exchanged.,28,在工業(yè)社會里人們關(guān)心 而信息社會必須關(guān)注 ,Unit 5,Information now represents money and “finance no longer has anything to do with money, but with information.” Whereas industrial societies wer

33、e concerned with protecting physical capital and providing safe routes for the transport of resources, information societies must be concerned with protecting information and the transfer of information.,29,= Whereas,Where the destruction of bridges was a threat to the national security of an indust

34、rial society, the destruction of information networks, especially those involved with financial transactions, is a threat to the national security of information societies.,Unit 5,30,Unit 5,過去一百年的政治學圍繞著工業(yè)時代的技術(shù),為信息時代而策劃設(shè)計的一本名字起得恰到好處的雜志互聯(lián)(Wired)在它的創(chuàng)刊號上關(guān)于新技術(shù)的出現(xiàn)發(fā)表了以下的論述:,This is the nature of conflict o

35、f the Information Age. While the politics of the last one hundred years centered around Industrial Age technology, the politics of the future will be based on Information Age concerns oriented towards the storage, protection and exchange of information.8 The premiere issue of the magazine designed f

36、or the Information Age, appropriately named Wired, had this to say about the emergence of new technology:,31,Unit 5,改造和重新構(gòu)建社會的相互依存關(guān)系以及我們個人生活的每一個方面,迫使我們重新考慮和估價以往想當然是正確的實際上每一種思想,每一個行動,每一項制度,The medium, or process, of our time electronic technology is reshaping and restructuring patterns of social inte

37、rdependence and every aspect of our personal life. It is forcing us to reconsider and re-evaluate practically every thought, every action, and every institution formerly taken for granted.,32,Unit 5,隨著信息時代的到來,出現(xiàn)了對社會基本結(jié)構(gòu)的新威脅,這種脆弱性導致政治抉擇的困難,而只要我們想不斷跟上第三次浪潮的大流就要面對這種抉擇,Our purpose is to take this concep

38、t one step further. We will demonstrate that with the Information Age come new threats to the infrastructure of the society. Our reliance on computer technology and the quick transition into a knowledge-based economy have left us vulnerable to attack, and that vulnerability creates difficult politic

39、al dilemmas that must be dealt with should we wish to continue following the currents of the Third Wave.9,33,Unit 5,一種基于對信息基礎(chǔ)設(shè)施惡意攻擊的沖突新形式,這種新形式是如何很快地發(fā)展起來威脅到第三次浪潮國家的安全的,On this account, the following issues must be further studied. First, a new paradigm for conflicts based upon hostile attacks agains

40、t information infrastructures and how this new paradigm is rapidly developing to threaten the security of Third Wave nations must be considered.,34,考察對于那些為攻擊目的而利用新技術(shù)的國家,我們所具有的優(yōu)勢和威懾力,可以從現(xiàn)實主義和自由主義觀點來進行考察,推測各方會如何應對確認的國家安全威脅,This issue should be placed in a theoretical context by examining the political

41、 advantages and deterrents to nations utilizing the capabilities of new technology for offensive purposes. This can be examined from both the realist and liberal perspective to speculate how each side would respond to the acknowledged national security threat.,Unit 5,35,將這些考慮與總體戰(zhàn)略框架結(jié)合起來,Unit 5,需要揭示與

42、歷史上技術(shù)發(fā)展的相似性,將它與新技術(shù)進行對比,,以做出關(guān)于這些新技術(shù)會對未來產(chǎn)生的戰(zhàn)略沖擊的假設(shè),Similarities to historical technological developments need to be explored and contrasted with new technology to develop hypotheses regarding the future strategic impacts that these new technologies will have.10 Finally prescriptions and solutions may

43、be proposed for integrating these concerns into the framework of a grand strategy in order to decrease the security threat and facilitate international cooperation in this area.,36,結(jié)合課文的思考題,What is the Third Wave? What is the major threat an information society faces? What was the role capitals play

44、ed in an industrialized nation? How do financial transactions take place in the information age?,37,At the present, state of the art microwave amplifiers and oscillator tubes can operate in a frequency range up to 40GHz and solid-state microwave devices up to 100GHz. A. recent and most advanced B. h

45、igh tech related C. sophisticated D. artistically manufactured,Exercises,38,Exercises,If you are unable to separate man from machine then, Turing says, we will have to attribute intelligence to the computer. A. to make an intelligent computer B. to consider the computer as being intelligent C. to co

46、ntribute to the computer with intelligence D. to let the computer have intelligence,39,Exercises,As DoD urgently wanted military command and control networks that could survive a nuclear war, ARPA was charged with inventing a technology that could get data to its destination reliably even if arbitrary part of the network disappeared as a result of a nuclear attack. DoD urgently needed networks of military command and

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論